Splunk Search

How to add contributing fields to unique values?

girtsgr
Explorer

Hi, I seem to be stuck with something pretty trivial. I have events with users and corresponding hostnames, eg:

User Hostname
user1 hostA
user1 hostB
user2 hostA
user2 hostC
user3 hostD

 

I want to count unique user-hostname values and show the contributing hostnames for users that have used more that 1 hostname like this:

User Hostnames used
user1 hostA hostB
user2 hostA hostC

 

This seems to take care of the first part of the task:

 

 

| stats dc(Hostname) as uh by User
| search uh > 1

 

 

 

How can I add the contributing Hostnames?

Formatting is not so important - it may be one field with all the hostnames like in the example above, or multiple fields, or one field together with the User field.

 

Thank you.

 

 

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| stats values(hostname) as hostnames by User
| eval uh=mvcount(hostnames)
| where uh > 1

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| stats values(hostname) as hostnames by User
| eval uh=mvcount(hostnames)
| where uh > 1
0 Karma

girtsgr
Explorer

Thank you! 🙂

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...